[kernel] r5061 - patch-tracking
Moritz Muehlenhoff
jmm-guest at costa.debian.org
Wed Dec 21 11:42:22 UTC 2005
Author: jmm-guest
Date: Wed Dec 21 11:42:21 2005
New Revision: 5061
Added:
patch-tracking/CVE-2005-0977
Log:
tmpfs DoS already resolved
Added: patch-tracking/CVE-2005-0977
==============================================================================
--- (empty file)
+++ patch-tracking/CVE-2005-0977 Wed Dec 21 11:42:21 2005
@@ -0,0 +1,23 @@
+Candidate: CVE-2005-0977
+References:
+ http://www.ubuntulinux.org/support/documentation/usn/usn-103-1
+ http://linux.bkbits.net:8080/linux-2.6/cset@420551fbRlv9-QG6Gw9Lw_bKVfPSsg
+ http://lkml.org/lkml/2005/2/5/111
+ http://www.securityfocus.com/bid/12970
+Description:
+ The shmem_nopage function in shmem.c for the tmpfs driver in Linux kernel
+ 2.6 does not properly verify the address argument, which allows local users
+ to cause a denial of service (kernel crash) via an invalid address.
+Notes:
+Bugs: 303177
+upstream: released (2.6.11)
+linux-2.6: N/A
+2.6.8-sarge-security: N/A
+2.4.27-sarge-security:
+2.6.8: released (2.6.8-16)
+2.4.19-woody-security:
+2.4.18-woody-security:
+2.4.17-woody-security:
+2.4.16-woody-security:
+2.4.17-woody-security-hppa:
+2.4.17-woody-security-ia64:
More information about the Kernel-svn-changes
mailing list